Note: This is an archival copy of Security Sun Alert 247406 as previously published on http://sunsolve.sun.com.|
Latest version of this security advisory is available from http://support.oracle.com as Sun Alert 1019843.1.
Solaris 9 Operating System
Solaris 10 Operating System
Date of Resolved Release
A security vulnerability in IKE packet handling in the libike library:
A security vulnerability in IKE packet handling in the libike library shipped with Solaris may allow a remote unprivileged user to crash the in.iked(1M) daemon, which is a type of Denial of Service (DoS).
2. Contributing Factors
This issue can occur in the following releases:
Note 2: OpenSolaris distributions may include additional bug fixes above and beyond the build from which it was derived.
To determine the base build of OpenSolaris, the following command can be used:
$ uname -vNote 3: The described issue only affects systems running the IKE daemon in.iked(1M).
The in.iked(1M) daemon is configured to run on a system if the file "/etc/inet/ike/config" is present. To determine if IKE services are configured on the system, the following command can be run:
$ ls /etc/inet/ike/configBy default, the in.iked(1M) service is disabled on Solaris systems.
If the described issue has been exploited, the IKE daemon may no longer be running on the system.
To determine if the IKE (in.iked(1M)) daemon is not running on a system that has IKE configured, the following command can be run:
$ pgrep in.iked || echo4. Workaround
There is no workaround for this issue. Please see the Resolution section below.
This issue is addressed in the following releases:
Copyright 2000-2009 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, CA 95054 U.S.A. All rights reserved.
This solution has no attachment